vishwanath rakesh ece 561

20
Embedded Security as a new phenomenon in the field of securing different system and Identifying and preventing hardware Trojan. CS/ECE 561 RAKESH VISHWANATH

Upload: rakeshcsu

Post on 13-Apr-2017

303 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Vishwanath rakesh ece 561

Embedded Security as a new phenomenon in the field of securing different system and Identifying and preventing hardware Trojan.CS/ECE 561 RAKESH VISHWANATH

Page 2: Vishwanath rakesh ece 561

Overview Introduction Embedded Security Requirement Embedded Security in different System Identifying and detecting Hardware

Trojans Isolation of Hardware Trojans Conclusion

Page 3: Vishwanath rakesh ece 561

Introduction to Embedded Security In today’s world Embedded Security is one or the other form most important requirement for increasing number of embedded system.

As future technologies which promise greater interaction between computer and humans are increasing there security becomes paramount issue which needs to be taken care.

Embedded Security is one form which makes successful deployment of next generation Embedded System.

Embedded security can’t be solved at a single security abstraction layer, but rather it needs a more multiple abstraction layer security for systems.

Page 4: Vishwanath rakesh ece 561

Embedded Security Requirement Embedded System often provide

critical functions that could be attack by malicious entities.

Embedded system security often requires protecting critical or sensitive information (code or data) throughout its lifetime.

Security should be such a way that it should possess data confidentiality, data integrity and peer authentication.

Security requirement may vary when considered from the view point of manufacture ex: cellphone.

Page 5: Vishwanath rakesh ece 561

Embedded Security in different systems

Classical and Quantum Cryptography – In Optical Burst Switching.

Traditional by which two separate cores providing security through

isolation and ARM trust Zone technology – In Dual Virtual CPU System.

Classical server based finger print verification and User based scheme where user authenticates directly from Embedded device - In Bio-metric authentication Security.

Page 6: Vishwanath rakesh ece 561

Embedded Security in Optical Burst Switching [OBS] Optical Burst Switching [OBS] is one of

the most promising optical switching technology for future internet which provides finer granularity but suffers from security vulnerabilities.

Even though OBS provide IPsec to secure IP network but its security limit is for traffic that do not necessary have IP layer.

Best to provide Embedded security framework which combines both classical and quantum cryptography.

Page 7: Vishwanath rakesh ece 561

Embedded Security in Dual Virtual CPU System In Dual Virtual CPU System security is the main concern

which needs to be solved.

Security in Dual Virtual CPU can be maintained by two ways.

- Traditional by which two separate cores providing security through isolation. - ARM trust Zone technology.

Page 8: Vishwanath rakesh ece 561

Embedded Security in Dual Virtual CPU System- Continued

The figure shows traditional way of achieving Embedded Security in Dual Virtual CPU.

In this method there is one SoC package with two separate system.

First CPU runs the normal world operating system its memory and peripherals consume lot of space.

Second CPU runs Security sensitive codes and its complete system is inside SoC.

Page 9: Vishwanath rakesh ece 561

Embedded Security in Dual Virtual CPU System- Continued

The figure shows ARM trust Zone of achieving Embedded Security in Dual Virtual CPU.

In this method the processor is viewed as two separate virtual processor while running software.

And in this method switching between trust Zone secure and normal world is initiated only by extension.

Design using trust Zone approach have the advantage of dual core CPU approach.

Page 10: Vishwanath rakesh ece 561

Embedded Security as Biometric authentication Biometric authentication is one form of security which

facilitates both user and server from malicious attack.

Security in Biometric can be achieved in two ways - Classical server based finger print verification. - User based scheme where user authenticates directly from Embedded device.

Page 11: Vishwanath rakesh ece 561

Embedded Security as Biometric authentication-Continued

The figure shows the Classical Server based finger print verification in Biometric authentication.

In this method the user enters his identity into server ex: magnetic card.

This form of Security scheme posses some security flaws.

Page 12: Vishwanath rakesh ece 561

Embedded Security as Biometric authentication-Continued

The figure shows the device based scheme where user authenticates directly from embedded device.

In this method device fingerprint sensor and template are located, avoiding server based security issues.

And in this method the device initiates a verification transaction by transmitting its ID to the server.

Page 13: Vishwanath rakesh ece 561

Identifying Hardware Trojan In recent years the threat to the

security of Integrated Circuits (IC’s) are Hardware Trojan Horse.

The figure shows the simple Trojan during normal operation.

Trojan can be identified by many ways like

- Gate level Characterization. - Path delay finger print. - power supply transient signals. - Current integration method.

Page 14: Vishwanath rakesh ece 561

Identifying Hardware Trojan – Gate level Characterization

The main technical obstacles to Hardware Trojan Horse detection is due to manufacturing variability.

In this method they first recover the characteristics of gate like recovering the properties of ICs.

In this method they make use of linear programming to solve the equations of system created by non destructive measurements of power and delay.

Page 15: Vishwanath rakesh ece 561

Identifying Hardware Trojan – Path delay finger print

In this method Trojans are characterized and the cost of testing is lowered.

In this method the chips are validated by comparing there delay parameter to the finger prints.

In path delay finger print the whole testing procedure is followed by three methods.

- path delay gathering of nominal chip. - Finger print generation. - Trojan Detection.

Page 16: Vishwanath rakesh ece 561

Identifying Hardware Trojan – Power supply transient signals

In this method the Trojans are detected based on the analysis of power transient signal and statistical prediction eclipse technique.

In this method process variation takes place due to power transient signal measured at each port so they use calibration test.

In calibration test the configure the scan chain to deliver a step input to the gate of p-channel transistor figure shows the calibration circuit response.

Page 17: Vishwanath rakesh ece 561

Identifying Hardware Trojan – Current Integration method

In this method the chip is connected by four ports and they are identified by exhaustive test as shown in the figure.

In this process the worst case charger will be obtained in response to pattern set and the pattern set will be applied to each chip .

In this method the small current difference between the Trojan inserted and Trojan free circuit can be magnified by the charger integration process.

Page 18: Vishwanath rakesh ece 561

Isolation of Hardware Trojan

The Isolation of Trojan is done at the final stage after detection of hardware Trojan.

The Trojan Isolation process has made the fact that will draw more current from their nearest power port.

In this method the current at each power is measured, integrated and compared with the current integration process of each port.

Page 19: Vishwanath rakesh ece 561

Conclusion As Embedded System are increasing day by day

security is the serious threat, Embedded security if one form of security which protects from malicious attack.

Embedded Security handles the information in trusted and isolated environment preventing from the malicious attack of device.

This Survey made an effort to explain Embedded security and their security in different system along with Identifying and Preventing Hardware Trojans.

Page 20: Vishwanath rakesh ece 561

Reference[1] Introduction : a). David D, Hwand “Securing Embedded system” IEEE Security & Privacy April 2006. b). Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi “Security as a new dimension in the field of Embeddded security” published in Citeseer 2004. [2] Embedded Security Requirement : Mehran Mozaffari Kermani, Meng Zhang, Anand Raghunathan, Niraj K. Jha “ Emerging Frontiers in Embedded security”. VLSI design and 2013 12th International conference on embedded system, IEEE 2013.[3] Embedded Security in different System: a). Yuhua Chen, Pramode k. Verma and Subhash kak “ Embedded security framework for Integrated Classical and Quantum Cryptography Service in Optical Burst Switching Network” published on 17th Feb 2009 Wiley Interscience. b). Wilson.P, Frey.A, Mihm.T,Kershaw D.” Implementing embedded security on Dual Virtual CPU System” Published in Design & Test computer, IEEE Nov-Dec 2007.[4] Identifying and detecting Hardware Trojans: Miodrag Potkonjak, Nahapetian, Nelson, Massey” Hardware Trojan Detection using gate level characterization” Published in Design automation conference 2009 DAC ’09 46th ACM/IEEE. [5] Isolation of Hardware Trojans: Xiaoxiao Wang, Hassan Salmani and Mohammad Tehranipoo,Jim Plusquellic “Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis IEEE 2008.